So much cyber is going on at #TheSAS2019 https://t.co/3WXP3Fgjlx
x0rz @ TheSAS2019 on Twitter

“So much cyber is going on at #TheSAS2019”

Twitter
Bitflipping attacks are awesome and damn effective at scale. Passively collect credentials without any noise, talk by @bishopfox #TheSAS2019 https://t.co/WhdyS56fi5
x0rz @ TheSAS2019 on Twitter

“Bitflipping attacks are awesome and damn effective at scale. Passively collect credentials without any noise, talk by @bishopfox #TheSAS2019”

Twitter
Open-source offensive tools that end up in APT toolset, making it harder to track them. Talk by @JusticeRage and @felixaime #TheSAS2019 https://t.co/5bwx5nS1aE
x0rz @ TheSAS2019 on Twitter

“Open-source offensive tools that end up in APT toolset, making it harder to track them. Talk by @JusticeRage and @felixaime #TheSAS2019”

Twitter
When attribution is easy! Malware targeting Israel from Iran, the developer was actually hosting the code on GitHub 🤦‍♂️ talk by @IdoNaor1 and @alexey_firsh #TheSAS2019 https://t.co/lC7cSZUp4T
x0rz @ TheSAS2019 on Twitter

“When attribution is easy! Malware targeting Israel from Iran, the developer was actually hosting the code on GitHub 🤦‍♂️ talk by @IdoNaor1 and @alexey_firsh #TheSAS2019”

Twitter
New hot APT in the hood, looks highly sophisticated and stealthy AF, very interesting stuff https://securelist.com/project-tajmahal/90240/ #TheSAS2019
Project TajMahal – a new sophisticated APT framework

TajMahal’ is a previously unknown and technically sophisticated APT framework discovered by Kaspersky Lab in the autumn of 2018.

Securelist - English - Global - securelist.com
Some fine #FIN7 social engineering targeting customer support of their targets, talk by @felixaime and Yury Namestnikov #TheSAS2019 https://t.co/hCNndGwA0C
x0rz @ TheSAS2019 on Twitter

“Some fine #FIN7 social engineering targeting customer support of their targets, talk by @felixaime and Yury Namestnikov #TheSAS2019”

Twitter

RT @[email protected]

The botnets keep coming at #TheSAS2019 with @[email protected] & @[email protected] talking about #Dreambot #Gozi (now also on Mac OS X !)

🐦🔗: https://twitter.com/k8em0/status/1115526704590540800

Katie Moussouris on Twitter

“The botnets keep coming at #TheSAS2019 with @peterkruse & @benkow_ talking about #Dreambot #Gozi (now also on Mac OS X !)”

Twitter
Some casual cybercrime doxxing happening at #TheSAS2019 😳 https://t.co/Fx93nnvwDc
x0rz @ TheSAS2019 on Twitter

“Some casual cybercrime doxxing happening at #TheSAS2019 😳”

Twitter
There’sa wide ecosystem for anti-fraud bypass, #carding is still alive and well. There’s even plugins to emulate the victims "fingerprints" (UA, IP, Cookies, etc.) - talk by @61ack1ynx #TheSAS2019 https://t.co/5VyBbEq37O
x0rz @ TheSAS2019 on Twitter

“There’sa wide ecosystem for anti-fraud bypass, #carding is still alive and well. There’s even plugins to emulate the victims "fingerprints" (UA, IP, Cookies, etc.) - talk by @61ack1ynx #TheSAS2019”

Twitter